Question

In: Computer Science

1. Why is it important for mobile workers and users to know what the risks, threats,...

1. Why is it important for mobile workers and users to know what the risks, threats, and vulnerabilities are when conducting remote access through the public Internet?

2. Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet?

3. Why is a remote access policy definition a best practice for handling remote employees and authorized users who require remote access from home or on business trips?

4. What security controls, monitoring, and logging should be enabled for remote VPN access and users?

5. Why should an organization mention that it will be monitoring and logging remote access use in its remote access policy definition?

Solutions

Expert Solution

1. Why is it important for mobile workers and users to know what the risks, threats, and vulnerabilities are when conducting remote access through the public Internet?
Answer:-------- To ensure that they are aware of how easy it is to gain information from the public internet, especially when they are accessing confidential information.

2. Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet?
Answer:-------- Without a proper policy to correctly define your Remote Access, any user will be able to insert and overwrite any details about the policy.

3. Why is a remote access policy definition a best practice for handling remote employees and authorized users who require remote access from home or on business trips?
Answer:-------- Designed to minimize the potential exposure of private information, which may result from unauthorized use of resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc

4. What security controls, monitoring, and logging should be enabled for remote VPN access and users?
Answer:-------- Multi-factor authentication of users and computers and a Password Lockout Policy and the controls needed for a VPN. An account and computer audit Policy will monitor and log events and can send notifications to System Administrators.

5. Why should an organization mention that it will be monitoring and logging remote access use in its remote access policy definition?
Answer:-------- Users should be notified by way of the Acceptable Use Policy that they may be monitored for compliance and that their activities are logged. This protects the organization and the user and is instrumental in helping establish compliance.


Related Solutions

What are some of the risks associated with estimation? Why is important to know what is...
What are some of the risks associated with estimation? Why is important to know what is meant by a confidence interval?
1. What are three risks and threats of the User Domain? 2. Why do organizations have...
1. What are three risks and threats of the User Domain? 2. Why do organizations have acceptable use policies (AUPs)? 3. Can Internet use and e-mail use policies be covered in an acceptable use policy? 4. Do compliance laws, such as the Health Insurance Portability and Accountability Act (HIPAA) or GLBA, play a role in AUP definition? 5. Why is an acceptable use policy not a fail-safe means of mitigating risks and threats within the User Domain?
What is the purpose of the retained earnings computation? Why is it important for users to...
What is the purpose of the retained earnings computation? Why is it important for users to analyze changes in this account? What will be the beginning balance in retained earnings in the following year? Can retained earnings be a negative amount? Why?
Micheal wants to know what are important crustaceans and why they are important?
Micheal wants to know what are important crustaceans and why they are important?
You want to know if Apple and Android phone users use different mobile apps for social...
You want to know if Apple and Android phone users use different mobile apps for social networking. You collect the following data. Apple Android Facebook 112 64 Snapchat 29 89 Instagram 78 103 The null hypothesis for this chi-square test would be? How many degrees of freedom are there for this chi-square test? What is the expected value of Apple Snapchat users? What is the expected value of Android Instagram users? Calculate the chi-square. Which is the appropriate description of...
What are the main objectives of comparative analysis and why are they important to external users...
What are the main objectives of comparative analysis and why are they important to external users of the financial statements, such as investors?
What are the main objectives of comparative analysis and why are they important to external users...
What are the main objectives of comparative analysis and why are they important to external users of the financial statements, such as investors? What are the main differences in the role of financial accounting and managerial accounting?
What are the main objectives of comparative analysis and why are they important to external users...
What are the main objectives of comparative analysis and why are they important to external users of the financial statements, such as investors?
What is the independence standard? Why is it important that users perceive auditors to be independent?...
What is the independence standard? Why is it important that users perceive auditors to be independent? Can an auditor be independent in fact, but not in appearance? Explain.
Why is it important that companies invest in training, learning and development? What are the risks...
Why is it important that companies invest in training, learning and development? What are the risks faced by an organization that does not invest, or invests minimally in training, learning and development? (understanding)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT